Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 1,223 results for "Cybersecurity Law & Strategy"...

Wave of Sexual Misconduct Claims Warrants Looks at Confidentiality, Nondisclosure Agreements
December 01, 2017
Companies try to protect their reputations from executives who have "gone wild" by including moral turpitude clauses as a basis to terminate executives for cause under their employment agreements. Similarly, in the context of employment disputes, companies try to protect themselves through the use of non-disclosure, non-disparagement and confidentiality provisions in settlement agreements.
Ransomware: What to Do When It Happens to You
December 01, 2017
In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident.
Social Media: Questions of Admissibility and Ethics
December 01, 2017
<b><i>Part Two of a Two-Part Article</i></b><p>Social media evidence can be acquired both informally — through an attorney's own investigation or from the client — or more formally through the use of discovery and the rules of discovery. While each gives rise to practical and ethical issues, this article focuses on informal methods of acquisition.
Security First Approach Provides a Significant Advantage to Law Firms
December 01, 2017
Security first is a holistic approach that views security not as an information technology nuisance in need of tight cost-management controls, but as a competitive advantage to differentiation from traditional business offerings. Here's what you need to know.
Podcast: Phishing
November 02, 2017
Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.
What Lies Beneath the Surface: The Dark Web
November 02, 2017
This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
When Products Start Teaching Cybersecurity Process
November 02, 2017
<b><i>New Nuix Cybersecurity Training and Certification Point to Pivot Not Only In Company But In Community At Large</b></i><p>Getting certifications from Nuix is no longer just about mastery of its engine. With a new certification coming to market next quarter, Nuix, like many in the ESI and forensic space (namely Guidance Software, now OpenText), is shifting gears and driving directly into the race for cybersecurity supremacy in an evolving and currently fractured technology marketplace.
The Dark Web
November 02, 2017
The goals of this article are: 1) to provide a basic outline of the structure of the Web and to provide some insight into the purpose for and content housed on each level; and 2) to give some practical tips on preventing your company's data from ending up on the Dark Web.
<i>Legal Tech</i><br>Sedona Conference Releases Finalized Third Edition of the Sedona Principles
November 02, 2017
<b><i>The Often-Cited e-Discovery Guidelines Were 'Put Through the Ringer,' and the Result Is Updated Principles and Expanded Commentary for a New Technological Age</b></i><p>Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. But the Principles had not seen a full-scale rewrite since 2007. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business. The wait, though, has come to a close.
New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies
November 02, 2017
As the adoption of cryptocurrencies spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations mean greater scrutiny than ever before.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›